2,115 research outputs found

    On the Benefit of Forward Error Correction at IEEE 802.11 Link Layer Level

    Get PDF
    This study examines the error distribution of aggregated MPDUs in 802.11n networks and whether or not forward error correction like raptor coding at the link layer would be useful in these networks. Several experiments with Qualcomm 4x4 802.11n hardware were performed. Two devices were used in a data link, while a third device sniffed all transmitted packets. The collected data was analyzed and used to calculate the packet error rate which would be obtained if FEC was used in order to determine whether FEC is useful at the link layer. It is shown that the error distribution of A-MPDUs does not follow the binomial distribution. Because of this, the performance of FEC in real networks is worse than for theoretical cases where a binomial distribution is assumed. Therefore, other ways to decrease the packet error rate have more impact than forward error correction

    Cross-layer based erasure code to reduce the 802.11 performance anomaly : when FEC meets ARF

    Get PDF
    Wireless networks have been widely accepted and deployed in our world nowadays. Consumers are now accustomed to wireless connectivity in their daily life due to the pervasive- ness of the 802.11b/g and wireless LAN standards. Specially, the emergence of the next evolution of Wi-Fi technology known as 802.11n is pushing a new revolution on personal wireless communication. However, in the context of WLAN, although multiple novel wireless access technologies have been proposed and developed to offer high bandwidth and guarantee quality of transmission, some deficiencies still remain due to the original design of WLAN-MAC layer. In particular, the performance anomaly of 802.11 is a serious issue which induces a potentially dramatic reduction of the global bandwidth when one or several mobile nodes downgrade their transmission rates following the signal degradation. In this paper, we study how the use of adaptive erasure code as a replacement of the Auto Rate Feedback mechanism can help to mitigate this performance anomaly issue. Preliminary study shows a global increase of the goodput delivered to mobile hosts attached to an access point

    Distributed MAC Protocol Supporting Physical-Layer Network Coding

    Full text link
    Physical-layer network coding (PNC) is a promising approach for wireless networks. It allows nodes to transmit simultaneously. Due to the difficulties of scheduling simultaneous transmissions, existing works on PNC are based on simplified medium access control (MAC) protocols, which are not applicable to general multi-hop wireless networks, to the best of our knowledge. In this paper, we propose a distributed MAC protocol that supports PNC in multi-hop wireless networks. The proposed MAC protocol is based on the carrier sense multiple access (CSMA) strategy and can be regarded as an extension to the IEEE 802.11 MAC protocol. In the proposed protocol, each node collects information on the queue status of its neighboring nodes. When a node finds that there is an opportunity for some of its neighbors to perform PNC, it notifies its corresponding neighboring nodes and initiates the process of packet exchange using PNC, with the node itself as a relay. During the packet exchange process, the relay also works as a coordinator which coordinates the transmission of source nodes. Meanwhile, the proposed protocol is compatible with conventional network coding and conventional transmission schemes. Simulation results show that the proposed protocol is advantageous in various scenarios of wireless applications.Comment: Final versio

    On the benefits of Cross Layer Feedback in Multi-hop Wireless Networks

    Full text link
    Wireless networks operate under harsh and time-varying channel conditions. In wireless networks the time varying channel conditions lead to variable SINR and high BER. The wireless channel is distinct from and more unpredictable than the far more reliable wireline channel. {\em Cross layer feedback} is a mechanism where layers provide {\em selective} information to other layers to boost the performance of wireless networks. {\em Cross layer feedback} can lead to a tremendous increase in the performance of the TCP/IP stack in wireless networks, and an increase in the user's satisfaction level. However, it is possible that naive feedbacks (or optimizations) can work non-coherently; therefore, these can negatively effect the performance of the TCP/IP stack. In this paper, we holistically analyze each layer of the TCP/IP stack, and propose possible Cross layer feedbacks which work coherently. The proposed Cross layer feedbacks can greatly enhance the performance of the TCP/IP stack in wireless networks

    Infrastructure dependent wireless multicast - the effect of spatial diversity and error correction

    Get PDF
    The use of multiple Access Points (APs) with one AP placed at the middle of a coverage area and the remaining placed at the edge may reduce the Packet Error Rate (PER) experienced by a group of multicast receivers. This paper shows that Spatial Diversity can augment the channel quality experienced especially by those nodes which are located farther from the Master AP, i.e. the AP at the middle, however this study also demonstrates the need for error correction scheme. The aim of this analysis is to propose a means of enhancing the infrastructure end of an IEEE 802.11n Wireless Local Area Network (WLAN), such that multicast data can be delivered reliably in order to guarantee that the received video has an adequate Peak Signal to Noise Ratio (PSNR), but with the constraint that the Medium Access Control (MAC) and the Physical (PHY) layer of the receivers are not modified, hence a legacy IEEE 802.11n node may join the multicast group and experience good Quality of Service.peer-reviewe

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
    • …
    corecore